Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise. We have no evidence that they were obtained directly from Yahoo’s systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts’ most recent sent emails.
... Any headline which ends in a question mark can be answered "no"
I just can't see how an underwater data centre could be more economical than a normal one on land. Maybe they're experimenting with some new offshore cooling system, but a whole data centre? No.
Cisco is already ahead of you there.
Cisco's NX-OS is based on Linux, but with a IOS-like CLI on top of that.
Then again, it's possible that the minimum wage staff in their call centre honestly believe that the script they're following is legit.
From the calls I've got myself and the ones reported by others, it really sounds like the callers truly believe what they're saying and don't know much better.
What we anticipate seldom occurs; what we least expect generally happens. -- Bengamin Disraeli